You are here

Cybersecurity

Why proposed net neutrality bill is the most extreme yet

While the latest net neutrality bill introduced in Congress has no chance of passage as drafted, it is a bay window view into how extreme the net neutrality movement has become and into what they are seeking from the FCC via backdoor regulation.

Why is this bill the most extreme version of net neutrality yet?

First, it is a completely unworkable framework.

  • It imposes a beyond-all-reason, effective absolute ban on prioritization of data traffic, essentially eliminating current essential network management flexibility to: protect networks from attack or malware; ensure quality of service; manage congestion, latency, and jitter; and handle unforeseen or emergency situations. Sections: 12(b)(5), 12(b)(6)

  • For all practical purposes, it destroys most any private sector incentive or benefit from competing or investing in broadband by outlawing any pricing/business model differentiation/innovation beyond commodity end user pricing. Section 12(b)(2)

Why Security is Google's Achilles Heel -- Part IV

It is interesting that since I started this series spotlighting that security is and has been, for all practical and official purposes, a low corporate priority for Google, a Googler now publicly claims: "for Google, there is no higher priority than the safety and security of our users."

  • This new public claim was made as part of a press release announcing that Google has joined the board of the National Cyber Security Alliance
  • While I commend Google for joining the National Cyber Security Alliance, it is telling that none of the relevant official Google corporate links, indicate that security is a high priority for Google: check "Our Philosophy -- Ten Things," "Design Principles," or even "Google's Security Philosophy." 
  • We will know when Google makes security a high priority when they actually walk the talk and when their official representation of their corporate priorities (in the main corporate links above) reflect that security has truly become a new higher priority for Google. 

This new claim and development presents a useful opportunity to evaluate Google's stated security philosophy.   

The Open Internet's Growing Security Problem -- Part XV

Evidence of the Open Internet's growing security problem only continues to mount. There also appears to be a growing and troubling disconnect between the seriousness of the actual problem and the seriousness of attention paid to the growing Internet security problem.  

  • For example, despite President Obama making cybersecurity a national security priority in his cybersecurity address 5-29-09, none of the FCC's 18 currently planned public workshops designed to help develop a National Broadband Plan are on cybersecurity.   

"Twitter, Facebook Sites Disrupted by Web AttackWSJ

  • "Multiple Internet sites, including popular hangouts Twitter and Facebook, were temporarily disrupted Thursday after they were struck by apparently coordinated computer attacks..."
  • "The companies traced the problem to what the computer industry calls "denial-of-service" attacks, which are designed to make sites inaccessible by overwhelming them with a flood of traffic. Though such attacks are fairly routine, simultaneous action against multiple consumer Internet companies is rare."

"Most users clueless about cybersecurity, FBI says" PC World

A Maslow "Hierarchy of Internet Needs?" -- Will there be Internet priorities or a priority-less Internet?

A central policy question concerning the future of the Internet, cloud computing, and the National Broadband Plan is whether there should be Internet priorities or a priority-less Internet?

  • The crux of the grand conflict over the direction of Internet policy is that proponents of a mandated a neutral/open Internet insist that only users can prioritize Internet traffic, not any other entity. 

To grasp the inherent problem and impracticality with a mandated neutral or priority-less Internet, it is helpful to ask if the Internet, which is comprised of hundreds of millions of individual users, has a mutual "hierarchy of needs" just like individuals have a "hierarchy of needs," per Maslow's famed, common sense "Hierarchy of Needs" theory.

P2P breach endangered President/First Family -- The open Internet's growing security problem -- Part XIV

New evidence of very serious Internet security problems sheds new light on why Senate Chairman Rockefeller has taken such a forceful leadership role on cybersecurity and why President Obama made increasing cybersecurity a national security priority in his 5-29 cybersecurity address.

  • Computerworld reported testimony before a Congressional oversight panel that sensitive details about a Presidential safe house, Presidential motorcade routes, and every U.S. nuclear facility were leaked on the Internet via a LimeWire P2P application. 
  • This serious Internet security problem with P2P applications was also the subject of a 2007 U.S. Patent and Trademark Office (PTO) report , which documented the severe security implications of P2P file-sharing programs that commonly have technological features that induce sharing of information that people did not want or expect to be shared.

The continued seriousness of P2P file-sharing breaches have prompted House Oversight Committee Chairman Edolphus Towns "to call for a ban on the use of peer-to-peer (P2P) software on all government and contractor computers and networks," per Computerworld.   

Google: "Security is part of Google's DNA" -- ("Do Not Ask")

"Security is part of Google's DNA" is Google's slogan to soothe security concerns about its services much like "competition is one click away" is Google's antitrust slogan to soothe antitrust concerns about its dominance. 

While Google claims security is metaphorically in the "DNA" or "genetic code" of their many cloud applications, "DNA" is also Google code for "Do Not Ask."

"Do Not Ask" is Google's unspoken MO -- method of operation.  

Helping the FCC Analyze Broadband Tradeoffs

"People are not approaching this from the perspective of helping us analyze what the trade-offs are" said FCC Broadband Coordinator Blair Levin about public comments to the National Broadband Plan -- per Multichannel News.  

  • Industry's comments have attempted to be very focused on helping the FCC understand and appreciate the many explicit trade-offs involved in this very important proceeding.

A recap of the key trade-offs facing the FCC:

My National Broadband Plan Comments to FCC -- Press Release & Actual Filed Comments

FOR IMMEDIATE RELEASE                                         

July 21, 2009                                                                                          

Contact:  Scott Cleland

703-217-2407

 

 

NetCompetition.org Files Reply Comments on National Broadband Plan NOI

Plan should ensure Government & private sector can work together and aren’t at cross-purposes

 

Defining the Problem(s) is the Crux of the National Broadband Plan

FCC Broadband Coordinator Blair Levin described the crux of the National Broadband Plan in testifying before the Commission 7-02 as "identifying where there are currently 'demonstrable public interest harms.'" That central task is essentially defining the problem(s) and is necessary to complete the last task of the plan: "identifying ways to lessen those public interest harms," or recommending solutions. Defining the problem largely defines the range of recommended solutions.

  • The plural use of "harms" here suggests that the Plan could end up "identifying" more problems than the obvious core problem prompting the Plan -- that not "all people of the United States have access to broadband capability."

Levin's choice of a classic organizational structure, background-problem-solution, is a wise, useful, and simplifying approach for such an exceedingly complex endeavor.

Ironically Zittrain's "Lost in the Cloud" emphasizes three of my big concerns/themes

Jonathan Zittrain's NYTimes Op-ed today, "Lost in the Clouds" ironically captured three of my big concerns/themes about the Internet and its natural outgrowth -- cloud computing.

  • I recommend this op-ed because it pulls together a whole host of converging Internet issues that others generally treat separately.
  • The problem with writing about these issues separately is that much of the richness of how these inter-related issues interact -- is lost.  

    Zittrain: "The cloud, however, comes with real dangers."

    • I agree. That has been much of the point of my 13 part series since the first of the year:
      • "The Open Internet's Growing Security Problem"

    Zittrain: "Worse, data stored online has less privacy protection both in practice and under the law."

Pages

Q&A One Pager Debunking Net Neutrality Myths